Research Article
Algebraic Degree Estimation of ACORN v3 Using Numeric Mapping
| Cipher | rounds | Attack | Time complexity | Reference |
| ACORN v3 | 647 | Key recovery attack | | [19] | 647 | Distinguishing attack | | Sect. 4.3 | 649 | Key recovery attack | | [19] | 649 | Distinguishing attack | | Sect. 4.3 | 676 | Distinguishing attack | | [17] | 676 | Distinguishing attack | | Sect. 4.3 | 704 | Key recovery attack | | [19] | 704 | Key recovery attack | | [20] | 704 | Distinguishing attack | | Sect. 4.3 | 721 | Distinguishing attack | | Sect. 4.3 | 750 | Key recovery attack | | [21] | 750 | Key recovery attack | | [20] |
|
|